Cyber Security Awareness and Vulnerabilities Blog

cs-network-insight-false-positive-blog-700x350.jpg

False positive

The phrase “false positive” has become so ubiquitous in Information Security that we often don’t stop to consider what it means or how it is used. Many use the term to describe every alert generated by a tool that does not lead to…

Read More

This work was originally done on Windows 7 Ultimate SP1 64-bit.  The versions of the libraries used in the tutorial are: termdd.sys version 6.1.7601.17514 rdpwsx.dll version 6.1.7601.17828 rdpwd.sys version 6.1.7601.17830 icaapi.dll version 6.1.7600.16385 rdpcorekmts.dll version 6.1.7601.17828   The Svchost.exe process In the Windows NT operating system family, svchost.exe ('Service Host) is a system process that serves or…

Read More

cs-best-practices-phishing-700x350.jpg

Phishing best practices

As long as you have an email address, you will forever be sent phishing emails attempting to lure you into some malicious activity. While we’re all familiar with the concept of these emails, it’s another thing entirely when it comes to designing one.…

Read More

cs-manage-identities-non-employees-blog-700x350.jpg

How to Manage Identities for Contractors, Consultants, and Other Non-Employees

For years, organizations have recognized the need to pay close attention to and manage the access that their employees have with the help of identity governance and administration solutions.  More recently, organizations are also being faced with the reality that they need to…

Read More

red-blue-purple-teams-best-practices-blog-header11.jpg

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly when it comes to technology, is by putting it through a stress test. Naturally, this same principle is…

Read More

cs-reduce-help-desk-cost-blogresize.png

IT teams handle a great number of tasks that enable an organization to run smoothly. These include handling questions related to technical support for the company’s computer systems, software, and hardware, in addition to performing regular system updates and meeting periodic training needs.…

Read More

We’ve compiled a list of the top 15 things every customer should know about Core Impact. Take a look and see what you may have been missing.

Read More

cs-what-is-rubber-stamping-resize.png

Bulk approvals of requests to have access to any of the various systems and assets quickly becomes a security concern. In order to avoid giving into the temptation to rush approvals of these requests without adequate review, organizations must first understand the damage that can result from overusing approvals, why it happens, and how this can be prevented.

Read More

cs-dark-web-blog-resize 2.jpg

Even as its top marketplace, Dream Market, prepares to close its doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, has recently reopened. And what are some of the most common wares…

Read More

Why you need IGA2.png

Demands on organizations continue to intensify – the precarious balance of requests for more access with the need to be more secure is difficult to maintain. Additionally, all of this is to be achieved faster, with fewer resources. It is more important than…

Read More